The GREATEST risk when end users have access to a database at its system level, instead of through the application, is that the users can:
A.
make unauthorized changes to the database directly, without an audit trail.
B.
make use of a system query language (SQL) to access information.
C.
remotely access the database.
D.
update data without authentication.
Explanation:
Having access to the database could provide access to database utilities, which can update the database without an audit trail and without using the application. Using SQL only provides read access to information, in a networked environment, accessing the database remotely does not make a difference.
What is critical is what is possible or completed through this access. To access a database, it is necessary that a user is authenticated using a user ID.